Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-1865

Опубликовано: 18 сент. 2007
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 1.9

Описание

The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.

РелизСтатусПримечание
devel

not-affected

hardy

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
edgy

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
feisty

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
gutsy

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 16%
0.00051
Низкий

1.9 Low

CVSS2

Связанные уязвимости

nvd
почти 18 лет назад

The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.

github
больше 3 лет назад

** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer."

EPSS

Процентиль: 16%
0.00051
Низкий

1.9 Low

CVSS2